Negative: Ephemeral Phenomenon

translated from the chapter in “Above Flames” :「負片:稍縱即逝的現象」 In the unconscious, nothing ever truly ends, nothing ever becomes the past or is forgotten… — Sigmund Freud, The Interpretation of Dreams (Die Traumdeutung) The writer lay bedridden, reading the newspaper, and by chance came across a review. The review mentioned that in Johannes Vermeer’s painting View of Delft, there wasContinue reading “Negative: Ephemeral Phenomenon”

Positive: Ephemeral Phenomenon

translated from a chapter in “Above Flames” :「正片:稍縱即逝的現象」 Cameras, once large and cumbersome boxes in the home that required porters to carry photography equipment, gradually transformed into essential household tools — a subtle historical shift. In 1888, Kodak introduced the first personal handheld camera, the “Kodak #1,” invented by George Eastman. From that moment, the slogan “Kodak asContinue reading “Positive: Ephemeral Phenomenon”

Preface: As From my Windows I sometimes Glance

translated from the chapter in 浮光“Above Flames” :「序/當我偶然從窗戶瞥見」(Wu Ming-Yi, 2024) “the transformation of events into words, driven by the hope that these words will be heard and that, upon being heard, these events will undergo judgment — be it divine judgment or the judgment of history.Despite the distance of such judgment, language possesses immediacy.” — JohnContinue reading “Preface: As From my Windows I sometimes Glance”

Positive : Light and what the camera captures(正片:光與相機所捕捉的)

translated from the chapter in 浮光“Above Flames” :「正片/光與相機所捕捉的」(Wu Ming-Yi, 2024) “Near the western peak of Kilimanjaro, a snow-covered mountain 19,710 feet above sea level, there is a dried and frozen carcass of a leopard. What is the leopard looking for in such an alpine place? No one can explain.” — Ernest Miller Hemingway “The Snows ofContinue reading “Positive : Light and what the camera captures(正片:光與相機所捕捉的)”

Negative:Light and what the camera captures

Hunting Will Life with Camera and Flashlight translated from the chapter in “Above Flames” :「負片,光與相機所捕捉的」(Wu Ming-Yi, 2024) I will spend the rest of my life wondering what light is. — Albert Einstein-1879–1955, circa 1917 Since university, aside from daily life, no matter where I go, I always carry a camera. There have been countless times whenContinue reading “Negative:Light and what the camera captures”

Bug Bounty Markets: Industry Self-regulatory Efforts

Introduction This article focuses on the concept of bug bounty programs and the different markets that exist for the disclosure of software vulnerabilities, including how such vulnerabilities are discovered, disclosed, and monetized. It also highlights the complexities involved in dealing with zero-day exploits and the development of organized programs aimed at mitigating software vulnerabilities. 1. Zero-Day Exploits (ZDEs): •Continue reading “Bug Bounty Markets: Industry Self-regulatory Efforts”

Payment Card Industry Certification (PCI DSS): Industry Self-regulatory Efforts

Introduction This article focuses on the Payment Card Industry Data Security Standard (PCI DSS), which is a set of standards designed to ensure that all companies that process, store, or transmit credit card information maintain a secure environment. It explains the origins, key control objectives, and technical requirements of the PCI DSS, as well as the complexities surroundingContinue reading “Payment Card Industry Certification (PCI DSS): Industry Self-regulatory Efforts”

Collective Botnet Mitigation Efforts: Industry Self-regulatory Efforts

Introduction In this article, the focus is on botnet mitigation through industry collective action. The lesson explains what a botnet is, describes the threat they pose, and discusses the industry and government efforts to combat them, especially through national anti-botnet initiatives. Additionally, it explores the factors that influence the success of botnet cleanup campaigns. 1. What is a Botnet? • A botnet isContinue reading “Collective Botnet Mitigation Efforts: Industry Self-regulatory Efforts”

Certificate Authorities and PKI (2): Industry Self-regulatory Efforts

Introduction In this article, we continue the discussion of Certificate Authorities (CAs) and Public Key Infrastructure (PKI), with a focus on the flaws in the trust model used by CAs and the industry response to address these vulnerabilities. The lesson examines the structural issues in the trust model, key security breaches, and subsequent industry reforms aimed at improving security in web communications.Continue reading “Certificate Authorities and PKI (2): Industry Self-regulatory Efforts”

Certificate Authorities and PKI (1): Industry Self-regulatory Efforts

Introduction This article explores how secure web communications using HTTPS were implemented, focusing on the Public Key Infrastructure (PKI) and Certificate Authorities (CAs). It covers how industry cooperation helped develop secure protocols and digital certificates, which are essential for enabling e-commerce and secure web traffic. 1. Basics of Cryptography: • Encryption: The process of converting plaintext into ciphertext using an algorithm and aContinue reading “Certificate Authorities and PKI (1): Industry Self-regulatory Efforts”